{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T17:32:15.801","vulnerabilities":[{"cve":{"id":"CVE-2018-5744","sourceIdentifier":"security-officer@isc.org","published":"2019-10-09T16:15:13.907","lastModified":"2024-11-21T04:09:18.140","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A failure to free memory can occur when processing messages having a specific combination of EDNS options. Versions affected are: BIND 9.10.7 -> 9.10.8-P1, 9.11.3 -> 9.11.5-P1, 9.12.0 -> 9.12.3-P1, and versions 9.10.7-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected."},{"lang":"es","value":"Se puede presentar un fallo al liberar memoria cuando se procesan mensajes que tienen una combinación específica de opciones EDNS. Las versiones afectadas son: BIND 9.10.7 hasta 9.10.8-P1, 9.11.3 hasta 9.11.5-P1, 9.12.0 hasta 9.12.3-P1, y las versiones 9.10.7-S1 hasta 9.11.5-S3 de BIND 9 Supported Preview Edition. Las versiones 9.13.0 hasta 9.13.6 de la rama de desarrollo 9.13 también están afectadas."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV30":[{"source":"security-officer@isc.org","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N\/AC:L\/Au:N\/C:N\/I:N\/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-772"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","versionStartIncluding":"9.10.7","versionEndExcluding":"9.10.8","matchCriteriaId":"36D308B6-4ED9-489D-A67F-959B52DB7CAD"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","versionStartIncluding":"9.11.3","versionEndExcluding":"9.11.5","matchCriteriaId":"7A1A72B8-2E02-41EF-A24E-77D6322DBEFF"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","versionStartIncluding":"9.12.0","versionEndExcluding":"9.12.3","matchCriteriaId":"C1B4653B-EE51-40D1-8845-FF2873C6D135"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","versionStartIncluding":"9.13.0","versionEndExcluding":"9.13.6","matchCriteriaId":"9F1DDC1A-7611-4242-9F5B-DC11B1DDE7A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.10.7:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"6243685F-1E5B-4FF6-AE1B-44798032FBA6"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.10.8:-:*:*:*:*:*:*","matchCriteriaId":"5ABCD105-A5E8-41AF-AE84-622543953449"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.10.8:p1:*:*:*:*:*:*","matchCriteriaId":"58D8814F-07FC-42A8-99EF-CD84AADEDC57"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.10.8:rc1:*:*:*:*:*:*","matchCriteriaId":"D2EE4D37-E5E9-4602-AC6B-5637E4483530"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.10.8:rc2:*:*:*:*:*:*","matchCriteriaId":"5DAC3F97-D828-474C-80D7-6D23A86372BF"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.11.5:-:*:*:*:*:*:*","matchCriteriaId":"A10C5868-A7C3-48A5-BDE9-1CE0FC0F515F"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.11.5:p1:*:*:*:*:*:*","matchCriteriaId":"EB1A7C62-4700-4DE1-B0C2-16D94D0FE4C2"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.11.5:rc1:*:*:*:*:*:*","matchCriteriaId":"9F066C19-68DB-44BE-8757-ACD794BA1A4B"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.11.5:s3:*:*:supported_preview:*:*:*","matchCriteriaId":"1AA16E51-819C-4A1B-B66E-1C60C1782C0D"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.12.3:-:*:*:*:*:*:*","matchCriteriaId":"F59BE241-48B6-47CC-8500-96A8A1E67954"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.12.3:p1:*:*:*:*:*:*","matchCriteriaId":"4B12AA91-F54B-4C97-9168-8E276F16F22B"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.12.3:rc1:*:*:*:*:*:*","matchCriteriaId":"D9759042-7B05-476D-8D2E-05BE221FFA64"}]}]}],"references":[{"url":"https:\/\/kb.isc.org\/docs\/cve-2018-5744","source":"security-officer@isc.org","tags":["Vendor Advisory"]},{"url":"https:\/\/kb.isc.org\/docs\/cve-2018-5744","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}